<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" submissionType="IETF" docName="draft-ietf-netconf-tcp-client-server-26" number="9643" updates="" obsoletes="" ipr="trust200902" tocInclude="true" symRefs="true" sortRefs="true" xml:lang="en" prepTime="2024-10-10T17:15:04" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-netconf-tcp-client-server-26" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9643" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Groupings for TCP Clients and Servers">YANG Groupings for TCP Clients and TCP Servers</title>
    <seriesInfo name="RFC" value="9643" stream="IETF"/>
    <author fullname="Kent Watsen" initials="K." surname="Watsen">
      <organization showOnFrontPage="true">Watsen Networks</organization>
      <address>
        <email>kent+ietf@watsen.net</email>
      </address>
    </author>
    <author fullname="Michael Scharf" initials="M." surname="Scharf">
      <organization abbrev="Hochschule Esslingen" showOnFrontPage="true">Hochschule Esslingen</organization>
      <address>
        <postal>
          <street>University of Applied Sciences</street>
          <street>Kanalstr. 33</street>
          <code>73728</code>
          <city>Esslingen am Neckar</city>
          <country>Germany</country>
        </postal>
        <email>michael.scharf@hs-esslingen.de</email>
      </address>
    </author>
    <date month="10" year="2024"/>
    <area>OPS</area>
    <workgroup>netconf</workgroup>
    <keyword>IETF</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document presents three YANG 1.1 modules
        to support the configuration of TCP clients and TCP servers. The modules
        include basic parameters of a TCP connection relevant for client or server
        applications, as well as client configuration required for traversing proxies.
        The data models defined by these modules may be used directly (e.g., to define a specific TCP client or TCP server) or in conjunction with the configuration defined for higher level protocols that depend on TCP (e.g., SSH, TLS, etc.).  Examples of higher level protocol configuration designed to be used in conjunction with this configuration are in RFCs 9644 and 9645.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9643" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2024 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-relation-to-other-rfcs">Relation to Other RFCs</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-specification-language">Specification Language</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.3">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.3.1"><xref derivedContent="1.3" format="counter" sectionFormat="of" target="section-1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-adherence-to-the-nmda">Adherence to the NMDA</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.4">
                <t indent="0" pn="section-toc.1-1.1.2.4.1"><xref derivedContent="1.4" format="counter" sectionFormat="of" target="section-1.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions">Conventions</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-ietf-tcp-common-module">The "ietf-tcp-common" Module</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-model-overview">Data Model Overview</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-example-usage">Example Usage</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.3">
                <t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent="2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-yang-module">YANG Module</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-ietf-tcp-client-module">The "ietf-tcp-client" Module</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-model-overview-2">Data Model Overview</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-example-usage-2">Example Usage</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-yang-module-2">YANG Module</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-ietf-tcp-server-module">The "ietf-tcp-server" Module</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-model-overview-3">Data Model Overview</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-example-usage-3">Example Usage</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-yang-module-3">YANG Module</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-for-the-ietf">Considerations for the "ietf-tcp-common" YANG Module</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-for-the-ietf-">Considerations for the "ietf-tcp-client" YANG Module</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.3">
                <t indent="0" pn="section-toc.1-1.5.2.3.1"><xref derivedContent="5.3" format="counter" sectionFormat="of" target="section-5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-for-the-ietf-t">Considerations for the "ietf-tcp-server" YANG Module</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t indent="0" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-ietf-xml-registry">The IETF XML Registry</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.2">
                <t indent="0" pn="section-toc.1-1.6.2.2.1"><xref derivedContent="6.2" format="counter" sectionFormat="of" target="section-6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-yang-module-names-regis">The YANG Module Names Registry</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">This document defines three YANG 1.1 <xref target="RFC7950" format="default" sectionFormat="of" derivedContent="RFC7950"/> modules
        to support the configuration of TCP clients and TCP servers (TCP is
        defined in <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>). The data models defined by these modules may be used directly (e.g., to define a specific TCP client or TCP server) or in conjunction with the configuration defined for higher level protocols that depend on TCP (e.g., SSH, TLS, etc.).  Examples of higher level protocol configuration designed to be used in conjunction with this configuration are in <xref target="RFC9644" format="default" sectionFormat="of" derivedContent="RFC9644"/> and <xref target="RFC9645" format="default" sectionFormat="of" derivedContent="RFC9645"/>.</t>
      <t indent="0" pn="section-1-2">The modules focus on three different types of base TCP parameters that matter
        for TCP-based applications: First, the modules cover fundamental configuration of a
        TCP client or TCP server application, such as addresses and port numbers. Second, a
        reusable grouping enables modification of application-specific parameters for TCP
        connections, such as use of TCP keepalives. And third, client configuration for
        traversing proxies is included as well. In each case, the modules have a very narrow
        scope and focus on a minimum set of required parameters.</t>
      <t indent="0" pn="section-1-3">Please be advised that while this document presents support for some TCP
        proxy techniques, there are other TCP proxy techniques that are not part
        of this document but could be added by augmenting the YANG module.</t>
      <section anchor="collective-effort" numbered="true" removeInRFC="false" toc="include" pn="section-1.1">
        <name slugifiedName="name-relation-to-other-rfcs">Relation to Other RFCs</name>
        <t indent="0" pn="section-1.1-1">This document presents three YANG modules <xref target="RFC7950" format="default" sectionFormat="of" derivedContent="RFC7950"/>
            that are part of a collection of RFCs that work together
            to ultimately support the configuration of both the clients
            and servers of both the Network Configuration Protocol (NETCONF) <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241"/> and
            RESTCONF <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040"/>.</t>
        <t indent="0" pn="section-1.1-2"> The dependency relationship between the primary YANG groupings
            defined in the various RFCs is presented in the below diagram.
            In some cases, a document may define secondary groupings that
            introduce dependencies not illustrated in the diagram.
            The labels in the diagram are shorthand names for the defining
            RFCs.  The citation references for shorthand names are provided below
            the diagram.</t>
        <t indent="0" pn="section-1.1-3">Please note that the arrows in the diagram point from referencer
            to referenced.  For example, the "crypto-types" RFC does not
            have any dependencies, whilst the "keystore" RFC depends on the
            "crypto-types" RFC.</t>
        <artwork align="left" pn="section-1.1-4">
                               crypto-types
                                 ^      ^
                                /        \
                               /          \
                      truststore         keystore
                       ^     ^             ^  ^
                       |     +---------+   |  |
                       |               |   |  |
                       |      +------------+  |
tcp-client-server      |     /         |      |
   ^    ^        ssh-client-server     |      |
   |    |           ^            tls-client-server
   |    |           |              ^     ^        http-client-server
   |    |           |              |     |                 ^
   |    |           |        +-----+     +---------+       |
   |    |           |        |                     |       |
   |    +-----------|--------|--------------+      |       |
   |                |        |              |      |       |
   +-----------+    |        |              |      |       |
               |    |        |              |      |       |
               |    |        |              |      |       |
            netconf-client-server       restconf-client-server

</artwork>
        <table align="left" pn="table-1">
          <name slugifiedName="name-label-in-diagram-to-rfc-map">Label in Diagram to RFC Mapping</name>
          <tbody>
            <tr>
              <th align="left" colspan="1" rowspan="1">Label in Diagram</th>
              <th align="left" colspan="1" rowspan="1">Reference</th>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">crypto-types</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="RFC9640" format="default" sectionFormat="of" derivedContent="RFC9640"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">truststore</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="RFC9641" format="default" sectionFormat="of" derivedContent="RFC9641"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">keystore</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="RFC9642" format="default" sectionFormat="of" derivedContent="RFC9642"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">tcp-client-server</td>
              <td align="left" colspan="1" rowspan="1">
                RFC 9643</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">ssh-client-server</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="RFC9644" format="default" sectionFormat="of" derivedContent="RFC9644"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">tls-client-server</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="RFC9645" format="default" sectionFormat="of" derivedContent="RFC9645"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">http-client-server</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="I-D.ietf-netconf-http-client-server" format="default" sectionFormat="of" derivedContent="HTTP-CLIENT-SERVER"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">netconf-client-server</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="I-D.ietf-netconf-netconf-client-server" format="default" sectionFormat="of" derivedContent="NETCONF-CLIENT-SERVER"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">restconf-client-server</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="I-D.ietf-netconf-restconf-client-server" format="default" sectionFormat="of" derivedContent="RESTCONF-CLIENT-SERVER"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-1.2">
        <name slugifiedName="name-specification-language">Specification Language</name>
        <t indent="0" pn="section-1.2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-1.3">
        <name slugifiedName="name-adherence-to-the-nmda">Adherence to the NMDA</name>
        <t indent="0" pn="section-1.3-1">This document is compliant with the Network Management Datastore
          Architecture (NMDA) <xref target="RFC8342" format="default" sectionFormat="of" derivedContent="RFC8342"/>. It does not define
          any protocol accessible nodes that are "config false".</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-1.4">
        <name slugifiedName="name-conventions">Conventions</name>
        <t indent="0" pn="section-1.4-1">  Various examples in this document use the XML
  <xref target="W3C.REC-xml-20081126" format="default" sectionFormat="of" derivedContent="W3C.REC-xml-20081126"/> encoding. Other encodings, such as JSON <xref target="RFC8259" format="default" sectionFormat="of" derivedContent="RFC8259"/>,
  could alternatively be used.
        </t>
      </section>
    </section>
    <section anchor="tcp-common-model" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-the-ietf-tcp-common-module">The "ietf-tcp-common" Module</name>
      <t indent="0" pn="section-2-1">This section defines a YANG 1.1 module called
        "ietf-tcp-common".  A high-level overview of the module is provided in
        <xref target="common-overview" format="default" sectionFormat="of" derivedContent="Section 2.1"/>. Examples illustrating the module's use
        are provided in <xref target="common-examples" format="default" sectionFormat="of" derivedContent="Section 2.2"/> ("Example Usage"). The YANG
        module itself is defined in <xref target="common-yang-module" format="default" sectionFormat="of" derivedContent="Section 2.3"/>.</t>
      <section anchor="common-overview" numbered="true" removeInRFC="false" toc="include" pn="section-2.1">
        <name slugifiedName="name-data-model-overview">Data Model Overview</name>
        <t indent="0" pn="section-2.1-1">This section provides an overview of the "ietf-tcp-common" module
          in terms of its features and groupings.</t>
        <section toc="exclude" numbered="true" removeInRFC="false" pn="section-2.1.1">
          <name slugifiedName="name-model-scope">Model Scope</name>
          <t indent="0" pn="section-2.1.1-1">This document presents a common "grouping" statement for basic TCP connection
            parameters that matter to applications. It is "common" in that this grouping
            is used by both the "ietf-tcp-client" and "ietf-tcp-server" modules.  In some
            TCP stacks, such parameters can also directly be set by an application using
            system calls, such as the sockets API. The base YANG data model in this document
            focuses on modeling TCP keepalives. This base model can be extended as needed.</t>
        </section>
        <section anchor="common-features" toc="exclude" numbered="true" removeInRFC="false" pn="section-2.1.2">
          <name slugifiedName="name-features">Features</name>
          <t indent="0" pn="section-2.1.2-1">The following diagram lists all the "feature" statements
            defined in the "ietf-tcp-common" module:</t>
          <sourcecode type="yangtree" markers="false" pn="section-2.1.2-2">
Features:
  +-- keepalives-supported
</sourcecode>
          <t indent="0" pn="section-2.1.2-3">The diagram above uses syntax that is similar to but not
              defined in <xref target="RFC8340" format="default" sectionFormat="of" derivedContent="RFC8340"/>.</t>
        </section>
        <section toc="exclude" numbered="true" removeInRFC="false" pn="section-2.1.3">
          <name slugifiedName="name-groupings">Groupings</name>
          <t indent="0" pn="section-2.1.3-1">The "ietf-tcp-common" module defines the following "grouping" statement:</t>
          <ul spacing="compact" bare="false" empty="false" indent="3" pn="section-2.1.3-2">
            <li pn="section-2.1.3-2.1">tcp-common-grouping</li>
          </ul>
          <t indent="0" pn="section-2.1.3-3">This grouping is presented in the following subsection.</t>
          <section anchor="tcp-common-grouping" numbered="true" removeInRFC="false" toc="exclude" pn="section-2.1.3.1">
            <name slugifiedName="name-the-tcp-common-grouping-gro">The "tcp-common-grouping" Grouping</name>
            <t indent="0" pn="section-2.1.3.1-1">The following tree diagram <xref target="RFC8340" format="default" sectionFormat="of" derivedContent="RFC8340"/> illustrates the
              "tcp-common-grouping" grouping:</t>
            <sourcecode type="yangtree" markers="false" pn="section-2.1.3.1-2">
  grouping tcp-common-grouping:
    +-- keepalives! {keepalives-supported}?
       +-- idle-time?        uint16
       +-- max-probes?       uint16
       +-- probe-interval?   uint16
</sourcecode>
            <t indent="0" pn="section-2.1.3.1-3">Comments:</t>
            <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-2.1.3.1-4">
              <li pn="section-2.1.3.1-4.1">The "keepalives" node is a "presence" container so that the mandatory descendant nodes
                 do not imply that keepalives must be configured.</li>
              <li pn="section-2.1.3.1-4.2">The "idle-time", "max-probes", and "probe-interval" nodes have the
                common meanings.  Please see the YANG module in <xref target="common-yang-module" format="default" sectionFormat="of" derivedContent="Section 2.3"/>
                for details.</li>
            </ul>
          </section>
        </section>
        <section toc="exclude" numbered="true" removeInRFC="false" pn="section-2.1.4">
          <name slugifiedName="name-protocol-accessible-nodes">Protocol-Accessible Nodes</name>
          <t indent="0" pn="section-2.1.4-1">The "ietf-tcp-common" module defines only "grouping" statements that are used by
            other modules to instantiate protocol-accessible nodes.  Thus, this module, when
            implemented, does not itself define any protocol-accessible nodes.</t>
        </section>
        <section toc="exclude" numbered="true" removeInRFC="false" pn="section-2.1.5">
          <name slugifiedName="name-guidelines-for-configuring-">Guidelines for Configuring TCP Keepalives</name>
          <t indent="0" pn="section-2.1.5-1">Network stacks may include keepalives in their TCP implementations,
          although this practice is not universally implemented. If keepalives are
            included, <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/> mandates that the application <bcp14>MUST</bcp14> be
            able to turn them on or off for each TCP connection and that they <bcp14>MUST</bcp14>
            default to off.</t>
          <t indent="0" pn="section-2.1.5-2">Keepalive mechanisms exist in many protocols. Depending on the protocol
            stack, TCP keepalives may only be one out of several alternatives.  Which
            mechanism(s) to use depends on the use case and application requirements. If
            keepalives are needed by an application, it is <bcp14>RECOMMENDED</bcp14> that the
            liveness check happens only at the protocol layers that are meaningful
            to the application.</t>
          <t indent="0" pn="section-2.1.5-3">A TCP keepalive mechanism <bcp14>SHOULD</bcp14> only be invoked in server applications
            that might otherwise hang indefinitely and consume resources unnecessarily
            if a client crashes or aborts a connection during a network failure <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>.
            TCP keepalives may consume significant resources both in the network and
            in endpoints (e.g., battery power).  In addition, frequent keepalives
            risk network congestion. The higher the frequency of keepalives, the
            higher the overhead.</t>
          <t indent="0" pn="section-2.1.5-4">
            Given the cost of keepalives, parameters have to be configured carefully:
          </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.1.5-5">
            <li pn="section-2.1.5-5.1">The default idle interval (leaf "idle-time") is two hours, i.e.,
                7200 seconds <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>.  A lower value <bcp14>MAY</bcp14> be
                configured, but idle intervals <bcp14>SHOULD NOT</bcp14> be smaller than 15
                seconds. Longer idle intervals <bcp14>SHOULD</bcp14> be used when possible.</li>
            <li pn="section-2.1.5-5.2">The maximum number of sequential keepalive probes that can fail
                (leaf "max-probes") trades off responsiveness and robustness against
                packet loss. ACK segments that contain no data are not reliably
                transmitted by TCP. Consequently, if a keepalive mechanism is
                implemented, it <bcp14>MUST NOT</bcp14> interpret failure to respond to any
                specific probe as a dead connection <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>. 
                Typically, a single-digit number should suffice.</li>
            <li pn="section-2.1.5-5.3">TCP implementations may include a parameter for the number of
                seconds between TCP keepalive probes (leaf "probe-interval"). In
                order to avoid congestion, the time interval between probes <bcp14>MUST NOT</bcp14>
                be smaller than one second. Significantly longer intervals <bcp14>SHOULD</bcp14> be
                used. It is important to note that keepalive probes (or replies)
                can get dropped due to network congestion. Sending further probe
                messages into a congested path after a short interval, without
                backing off timers, could cause harm and result in a congestion
                collapse.  Therefore, it is essential to pick a large, conservative
                value for this interval.</li>
          </ul>
        </section>
      </section>
      <section anchor="common-examples" numbered="true" removeInRFC="false" toc="include" pn="section-2.2">
        <name slugifiedName="name-example-usage">Example Usage</name>
        <t indent="0" pn="section-2.2-1">This section presents an example showing the "tcp-common-grouping" grouping
        populated with some data.</t>
        <sourcecode type="xml" markers="false" pn="section-2.2-2">
&lt;!-- The outermost element below doesn't exist in the data model. --&gt;
&lt;!--  It simulates if the "grouping" were a "container" instead.  --&gt;

&lt;tcp-common xmlns="urn:ietf:params:xml:ns:yang:ietf-tcp-common"&gt;
  &lt;keepalives&gt;
    &lt;idle-time&gt;7200&lt;/idle-time&gt;
    &lt;max-probes&gt;9&lt;/max-probes&gt;
    &lt;probe-interval&gt;75&lt;/probe-interval&gt;
  &lt;/keepalives&gt;
&lt;/tcp-common&gt;
</sourcecode>
      </section>
      <section anchor="common-yang-module" numbered="true" removeInRFC="false" toc="include" pn="section-2.3">
        <name slugifiedName="name-yang-module">YANG Module</name>
        <t indent="0" pn="section-2.3-1">The "ietf-tcp-common" YANG module references <xref target="RFC6991" format="default" sectionFormat="of" derivedContent="RFC6991"/>
        and <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>.</t>
        <sourcecode name="ietf-tcp-common@2024-10-10.yang" type="yang" markers="true" pn="section-2.3-2">
module ietf-tcp-common {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-common";
  prefix tcpcmn;

  organization
    "IETF NETCONF (Network Configuration) Working Group and the
     IETF TCP Maintenance and Minor Extensions (TCPM) Working Group";

  contact
    "WG Web:   https://datatracker.ietf.org/wg/netconf
               https://datatracker.ietf.org/wg/tcpm
     WG List:  NETCONF WG list &lt;mailto:netconf@ietf.org&gt;
               TCPM WG list &lt;mailto:tcpm@ietf.org&gt;
     Authors:  Kent Watsen &lt;mailto:kent+ietf@watsen.net&gt;
               Michael Scharf
               &lt;mailto:michael.scharf@hs-esslingen.de&gt;";

  description
    "This module define a reusable 'grouping' that is common
     to both TCP clients and TCP servers.  This grouping statement
     is used by both the 'ietf-tcp-client' and 'ietf-tcp-server'
     modules.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
     'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
     'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
     are to be interpreted as described in BCP 14 (RFC 2119)
     (RFC 8174) when, and only when, they appear in all
     capitals, as shown here.

     Copyright (c) 2024 IETF Trust and the persons identified
     as authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with
     or without modification, is permitted pursuant to, and
     subject to the license terms contained in, the Revised
     BSD License set forth in Section 4.c of the IETF Trust's
     Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC 9643
     (https://www.rfc-editor.org/info/rfc9643); see the RFC
     itself for full legal notices.";

  revision 2024-10-10 {
    description
      "Initial version.";
    reference
      "RFC 9643: YANG Groupings for TCP Clients and TCP Servers";
  }

  // Features

  feature keepalives-supported {
    description
      "Indicates that keepalives are supported.";
  }

  // Groupings

  grouping tcp-common-grouping {
    description
      "A reusable grouping for configuring TCP parameters common
       to TCP connections as well as the operating system as a
       whole.";
    container keepalives {
      if-feature "keepalives-supported";
      presence "Indicates that keepalives are enabled, aligning to
                the requirement in Section 3.8.4 of RFC 9293 that
                states keepalives are off by default.";
      description
        "Configures the keepalive policy to proactively test the
         aliveness of the TCP peer.  An unresponsive TCP peer is
         dropped after approximately (idle-time + max-probes *
         probe-interval) seconds.  Further guidance can be found
         in Section 2.1.5 of RFC 9643.";
      reference
        "RFC 9293: Transmission Control Protocol (TCP)";
      leaf idle-time {
        type uint16 {
          range "1..max";
        }
        units "seconds";
        default "7200";
        description
          "Sets the amount of time after which a TCP-level probe
           message will be sent to test the aliveness of the TCP
           peer if no data has been received from the TCP peer.
           Two hours (7200 seconds) is a safe value, per Section
           3.8.4 of RFC 9293.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)";
      }
      leaf max-probes {
        type uint16 {
          range "1..max";
        }
        default "9";
        description
          "Sets the maximum number of sequential keepalive probes
           that can fail to obtain a response from the TCP peer
           before assuming the TCP peer is no longer alive.";
      }
      leaf probe-interval {
        type uint16 {
          range "1..max";
        }
        units "seconds";
        default "75";
        description
          "Sets the time interval between failed probes.  The
           interval SHOULD be significantly longer than one second
           in order to avoid harm on a congested link.";
      }
    } // container keepalives
  } // grouping tcp-common-grouping

}
</sourcecode>
      </section>
    </section>
    <section anchor="tcp-client-model" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-the-ietf-tcp-client-module">The "ietf-tcp-client" Module</name>
      <t indent="0" pn="section-3-1">This section defines a YANG 1.1 module called
        "ietf-tcp-client".  A high-level overview of the module is provided in
        <xref target="client-overview" format="default" sectionFormat="of" derivedContent="Section 3.1"/>. Examples illustrating the module's use
        are provided in <xref target="client-examples" format="default" sectionFormat="of" derivedContent="Section 3.2"/> ("Example Usage"). The YANG
        module itself is defined in <xref target="client-yang-module" format="default" sectionFormat="of" derivedContent="Section 3.3"/>.</t>
      <section anchor="client-overview" numbered="true" removeInRFC="false" toc="include" pn="section-3.1">
        <name slugifiedName="name-data-model-overview-2">Data Model Overview</name>
        <t indent="0" pn="section-3.1-1">This section provides an overview of the "ietf-tcp-client" module
          in terms of its features and groupings.</t>
        <section anchor="features" toc="exclude" numbered="true" removeInRFC="false" pn="section-3.1.1">
          <name slugifiedName="name-features-2">Features</name>
          <t indent="0" pn="section-3.1.1-1">The following diagram lists all the "feature" statements
            defined in the "ietf-tcp-client" module:</t>
          <sourcecode type="yangtree" markers="false" pn="section-3.1.1-2">
Features:
  +-- local-binding-supported
  +-- tcp-client-keepalives
  +-- proxy-connect
      +-- socks4-supported {proxy-connect}?
      +-- socks4a-supported {proxy-connect}?
      +-- socks5-supported {proxy-connect}?
          +-- socks5-gss-api {socks5-supported}?
          +-- socks5-username-password {socks5-supported}?
</sourcecode>
          <t indent="0" pn="section-3.1.1-3">Comments:</t>
          <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-3.1.1-4">
            <li pn="section-3.1.1-4.1">The "local-binding-supported" feature indicates that
                the server supports configuring local bindings (i.e.,
            the local address and local port) for TCP clients.</li>
            <li pn="section-3.1.1-4.2">The "tcp-client-keepalives" feature indicates that
                TCP keepalive parameters are configurable for
                TCP clients on the server implementing this feature.</li>
            <li pn="section-3.1.1-4.3">The "proxy-connect" feature indicates the TCP client
                supports connecting through TCP proxies.</li>
            <li pn="section-3.1.1-4.4">The "socks4-supported" feature indicates the
                TCP client supports Socks4-based proxies.</li>
            <li pn="section-3.1.1-4.5">The "socks4a-supported" feature indicates the
                TCP client supports Socks4a-based proxies.  The difference
                between Socks4 and Socks4a is that Socks4a enables the
                "remote-address" to be specified using a hostname, in
                addition to an IP address.</li>
            <li pn="section-3.1.1-4.6">The "socks5-supported" feature indicates the
                TCP client supports Socks5-based proxies.</li>
            <li pn="section-3.1.1-4.7">The "socks5-gss-api" feature indicates that
                the server, when acting as a TCP client, supports
                authenticating to a SOCKS Version 5 proxy server
                using Generic Security Service Application Program Interface (GSS-API) credentials.</li>
            <li pn="section-3.1.1-4.8">The "socks5-username-password" feature indicates
                that the server, when acting as a TCP client,
                supports authenticating to a SOCKS Version 5
                proxy server using "username" and "password"
                credentials."</li>
          </ul>
          <t indent="0" pn="section-3.1.1-5">The diagram above uses syntax that is similar to but not
              defined in <xref target="RFC8340" format="default" sectionFormat="of" derivedContent="RFC8340"/>.</t>
        </section>
        <section toc="exclude" numbered="true" removeInRFC="false" pn="section-3.1.2">
          <name slugifiedName="name-groupings-2">Groupings</name>
          <t indent="0" pn="section-3.1.2-1">The "ietf-tcp-client" module defines the following "grouping" statement:</t>
          <ul spacing="compact" bare="false" empty="false" indent="3" pn="section-3.1.2-2">
            <li pn="section-3.1.2-2.1">tcp-client-grouping</li>
          </ul>
          <t indent="0" pn="section-3.1.2-3">This grouping is presented in the following subsection.</t>
          <section anchor="tcp-client-grouping" numbered="true" removeInRFC="false" toc="exclude" pn="section-3.1.2.1">
            <name slugifiedName="name-the-tcp-client-grouping-gro">The "tcp-client-grouping" Grouping</name>
            <t indent="0" pn="section-3.1.2.1-1">The following tree diagram <xref target="RFC8340" format="default" sectionFormat="of" derivedContent="RFC8340"/> illustrates the
              "tcp-client-grouping" grouping:</t>
            <sourcecode type="yangtree" markers="false" pn="section-3.1.2.1-2">
  grouping tcp-client-grouping:
    +-- remote-address                inet:host
    +-- remote-port?                  inet:port-number
    +-- local-address?                inet:ip-address
    |       {local-binding-supported}?
    +-- local-port?                   inet:port-number
    |       {local-binding-supported}?
    +-- proxy-server! {proxy-connect}?
    |  +-- (proxy-type)
    |     +--:(socks4) {socks4-supported}?
    |     |  +-- socks4-parameters
    |     |     +-- remote-address    inet:ip-address
    |     |     +-- remote-port?      inet:port-number
    |     +--:(socks4a) {socks4a-supported}?
    |     |  +-- socks4a-parameters
    |     |     +-- remote-address    inet:host
    |     |     +-- remote-port?      inet:port-number
    |     +--:(socks5) {socks5-supported}?
    |        +-- socks5-parameters
    |           +-- remote-address               inet:host
    |           +-- remote-port?                 inet:port-number
    |           +-- authentication-parameters!
    |              +-- (auth-type)
    |                 +--:(gss-api) {socks5-gss-api}?
    |                 |  +-- gss-api
    |                 +--:(username-password)
    |                          {socks5-username-password}?
    |                    +-- username-password
    |                       +-- username                string
    |                       +---u ct:password-grouping
    +---u tcpcmn:tcp-common-grouping
</sourcecode>
            <t indent="0" pn="section-3.1.2.1-3">Comments:</t>
            <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-3.1.2.1-4">
              <li pn="section-3.1.2.1-4.1">The "remote-address" node, which is mandatory, may be configured as
              an IPv4 address, an IPv6 address, or a hostname.</li>
              <li pn="section-3.1.2.1-4.2">The "remote-port" leaf is defined with neither a "default" nor a "mandatory" statement.  YANG modules using this grouping <bcp14>SHOULD</bcp14> refine the grouping
with a "default" statement, when the port number is well-known (e.g., a port number allocated by IANA), or with a
"mandatory" statement, if a port number needs to always be configured.   The <bcp14>SHOULD</bcp14> can be ignored when the port number is neither well-known nor mandatory to configure, such as might be the case when this grouping is used by another grouping.</li>
              <li pn="section-3.1.2.1-4.3">The "local-address" node, which is enabled by the "local-binding-supported"
                feature (<xref target="features" format="default" sectionFormat="of" derivedContent="Section 3.1.1"/>), may be configured as
                an IPv4 address, an IPv6 address, or a wildcard value.</li>
              <li pn="section-3.1.2.1-4.4">The "local-port" node, which is enabled by the "local-binding-supported"
                feature (<xref target="features" format="default" sectionFormat="of" derivedContent="Section 3.1.1"/>), is not mandatory. Its default
                value is "0", indicating that the operating system can pick an
                arbitrary port number.</li>
              <li pn="section-3.1.2.1-4.5">The "proxy-server" node is enabled by a "feature" statement and, for
                servers that enable it, is a "presence" container so that the descendant
                "mandatory true" choice node does not imply that the proxy-server node
                must be configured.  The proxy-server node uses a "choice" statement
                to allow one of several types of proxies to be configured.  The choices
                presented in this document include Socks4, Socks4a, and Socks5, each
                enabled by a YANG feature (see <xref target="features" format="default" sectionFormat="of" derivedContent="Section 3.1.1"/>).  Other proxy
                types may be added by future work.</li>
              <li pn="section-3.1.2.1-4.6">This grouping uses the "password-grouping" grouping discussed in
                <xref target="RFC9640" format="default" sectionFormat="of" derivedContent="RFC9640"/>.</li>
              <li pn="section-3.1.2.1-4.7">This grouping uses the "tcp-common-grouping" grouping discussed in
                <xref target="tcp-common-grouping" format="default" sectionFormat="of" derivedContent="Section 2.1.3.1"/>.</li>
            </ul>
          </section>
        </section>
        <section toc="exclude" numbered="true" removeInRFC="false" pn="section-3.1.3">
          <name slugifiedName="name-protocol-accessible-nodes-2">Protocol-Accessible Nodes</name>
          <t indent="0" pn="section-3.1.3-1">The "ietf-tcp-client" module defines only "grouping" statements that are used by
          other modules to instantiate protocol-accessible nodes.  Thus, this module, when
          implemented, does not itself define any protocol-accessible nodes.</t>
        </section>
      </section>
      <section anchor="client-examples" numbered="true" removeInRFC="false" toc="include" pn="section-3.2">
        <name slugifiedName="name-example-usage-2">Example Usage</name>
        <t indent="0" pn="section-3.2-1">This section presents two examples showing the "tcp-client-grouping" grouping
          populated with some data.  This example shows a TCP client configured to
        not connect via a proxy:</t>
        <sourcecode type="xml" markers="false" pn="section-3.2-2">
&lt;!-- The outermost element below doesn't exist in the data model. --&gt;
&lt;!--  It simulates if the "grouping" were a "container" instead.  --&gt;

&lt;tcp-client xmlns="urn:ietf:params:xml:ns:yang:ietf-tcp-client"&gt;
  &lt;remote-address&gt;www.example.com&lt;/remote-address&gt;
  &lt;remote-port&gt;8443&lt;/remote-port&gt;
  &lt;local-address&gt;192.0.2.2&lt;/local-address&gt;
  &lt;local-port&gt;12345&lt;/local-port&gt;
  &lt;keepalives&gt;
    &lt;idle-time&gt;7200&lt;/idle-time&gt;
    &lt;max-probes&gt;9&lt;/max-probes&gt;
    &lt;probe-interval&gt;75&lt;/probe-interval&gt;
  &lt;/keepalives&gt;
&lt;/tcp-client&gt;
</sourcecode>
        <t indent="0" pn="section-3.2-3">This example shows a TCP client configured to connect via a proxy.</t>
        <sourcecode type="xml" markers="false" pn="section-3.2-4">
&lt;!-- The outermost element below doesn't exist in the data model. --&gt;
&lt;!--  It simulates if the "grouping" were a "container" instead.  --&gt;

&lt;tcp-client xmlns="urn:ietf:params:xml:ns:yang:ietf-tcp-client"&gt;
  &lt;remote-address&gt;www.example.com&lt;/remote-address&gt;
  &lt;remote-port&gt;8443&lt;/remote-port&gt;
  &lt;local-address&gt;192.0.2.2&lt;/local-address&gt;
  &lt;local-port&gt;12345&lt;/local-port&gt;
  &lt;proxy-server&gt;
    &lt;socks5-parameters&gt;
      &lt;remote-address&gt;proxy.example.com&lt;/remote-address&gt;
      &lt;remote-port&gt;1080&lt;/remote-port&gt;
      &lt;authentication-parameters&gt;
        &lt;username-password&gt;
          &lt;username&gt;foobar&lt;/username&gt;
          &lt;cleartext-password&gt;secret&lt;/cleartext-password&gt;
        &lt;/username-password&gt;
      &lt;/authentication-parameters&gt;
    &lt;/socks5-parameters&gt;
  &lt;/proxy-server&gt;
  &lt;keepalives&gt;
    &lt;idle-time&gt;7200&lt;/idle-time&gt;
    &lt;max-probes&gt;9&lt;/max-probes&gt;
    &lt;probe-interval&gt;75&lt;/probe-interval&gt;
  &lt;/keepalives&gt;
&lt;/tcp-client&gt;
</sourcecode>
      </section>
      <section anchor="client-yang-module" numbered="true" removeInRFC="false" toc="include" pn="section-3.3">
        <name slugifiedName="name-yang-module-2">YANG Module</name>
        <t indent="0" pn="section-3.3-1">The "ietf-tcp-client" YANG module references <xref target="SOCKS" format="default" sectionFormat="of" derivedContent="SOCKS"/>, <xref target="SOCKS_4A" format="default" sectionFormat="of" derivedContent="SOCKS_4A"/>, <xref target="RFC1928" format="default" sectionFormat="of" derivedContent="RFC1928"/>, 
        <xref target="RFC1929" format="default" sectionFormat="of" derivedContent="RFC1929"/>, <xref target="RFC2743" format="default" sectionFormat="of" derivedContent="RFC2743"/>, <xref target="RFC6991" format="default" sectionFormat="of" derivedContent="RFC6991"/>,
        <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>, and <xref target="RFC9640" format="default" sectionFormat="of" derivedContent="RFC9640"/>.</t>
        <sourcecode name="ietf-tcp-client@2024-10-10.yang" type="yang" markers="true" pn="section-3.3-2">
module ietf-tcp-client {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-client";
  prefix tcpc;

  import ietf-inet-types {
    prefix inet;
    reference
      "RFC 6991: Common YANG Data Types";
  }

  import ietf-crypto-types {
    prefix ct;
    reference
      "RFC 9640: YANG Data Types and Groupings for Cryptography";
  }

  import ietf-tcp-common {
    prefix tcpcmn;
    reference
      "RFC 9643: YANG Groupings for TCP Clients and TCP Servers";
  }

  organization
    "IETF NETCONF (Network Configuration) Working Group and the
     IETF TCP Maintenance and Minor Extensions (TCPM) Working Group";

  contact
    "WG Web:   https://datatracker.ietf.org/wg/netconf
               https://datatracker.ietf.org/wg/tcpm
     WG List:  NETCONF WG list &lt;mailto:netconf@ietf.org&gt;
               TCPM WG list &lt;mailto:tcpm@ietf.org&gt;
     Authors:  Kent Watsen &lt;mailto:kent+ietf@watsen.net&gt;
               Michael Scharf
               &lt;mailto:michael.scharf@hs-esslingen.de&gt;";

  description
    "This module defines reusable groupings for TCP clients that
     can be used as a basis for specific TCP client instances.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
     'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
     'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
     are to be interpreted as described in BCP 14 (RFC 2119)
     (RFC 8174) when, and only when, they appear in all
     capitals, as shown here.

     Copyright (c) 2024 IETF Trust and the persons identified
     as authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with
     or without modification, is permitted pursuant to, and
     subject to the license terms contained in, the Revised
     BSD License set forth in Section 4.c of the IETF Trust's
     Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC 9643
     (https://www.rfc-editor.org/info/rfc9643); see the RFC
     itself for full legal notices.";

  revision 2024-10-10 {
    description
      "Initial version.";
    reference
      "RFC 9643: YANG Groupings for TCP Clients and TCP Servers";
  }

  // Features

  feature local-binding-supported {
    description
      "Indicates that the server supports configuring local
       bindings (i.e., the local address and local port) for
       TCP clients.";
  }

  feature tcp-client-keepalives {
    description
      "TCP keepalive parameters are configurable for
       TCP clients on the server implementing this feature.";
    reference
      "RFC 9293: Transmission Control Protocol (TCP)";
  }

  feature proxy-connect {
    description
      "Indicates the TCP client supports connecting through
       TCP proxies.";
  }

  feature socks4-supported {
    if-feature "proxy-connect";
    description
      "Indicates the TCP client supports Socks4-based proxies.";
    reference
      "SOCKS Proceedings: 1992 Usenix Security Symposium";
  }

  feature socks4a-supported {
    if-feature "proxy-connect";
    description
      "Indicates the TCP client supports Socks4a-based proxies.";
    reference
      "OpenSSH message:
         SOCKS 4A: A Simple Extension to SOCKS 4 Protocol
         &lt;https://www.openssh.com/txt/socks4a.protocol&gt;";
  }

  feature socks5-supported {
    if-feature "proxy-connect";
    description
      "Indicates the TCP client supports Socks5-based proxies.";
    reference
      "RFC 1928: SOCKS Protocol Version 5";
  }

  feature socks5-gss-api {
    if-feature "socks5-supported";
    description
      "Indicates that the server, when acting as a TCP client,
       supports authenticating to a SOCKS Version 5 proxy server
       using GSS-API credentials.";
    reference
      "RFC 1928: SOCKS Protocol Version 5";
  }

  feature socks5-username-password {
    if-feature "socks5-supported";
    description
      "Indicates that the server, when acting as a TCP client,
       supports authenticating to a SOCKS Version 5 proxy server
       using 'username' and 'password' credentials.";
    reference
      "RFC 1928: SOCKS Protocol Version 5";
  }

  // Groupings

  grouping tcp-client-grouping {
    description
      "A reusable grouping for configuring a TCP client.

       Note that this grouping uses fairly typical descendant
       node names such that a stack of 'uses' statements will
       have name conflicts.  It is intended that the consuming
       data model will resolve the issue (e.g., by wrapping
       the 'uses' statement in a container called
       'tcp-client-parameters').  This model purposely does
       not do this itself so as to provide maximum flexibility
       to consuming models.";

    leaf remote-address {
      type inet:host;
      mandatory true;
      description
        "The IP address or hostname of the remote peer to
         establish a connection with.  If a domain name is
         configured, then the DNS resolution should happen on
         each connection attempt.  If the DNS resolution
         results in multiple IP addresses, the IP addresses
         are tried according to local preference order until
         a connection has been established or until all IP
         addresses have failed.";
    }
    leaf remote-port {
      type inet:port-number;
      description
        "The port number of the remote TCP server.";
    }
    leaf local-address {
      if-feature "local-binding-supported";
      type inet:ip-address;
      description
        "The local IP address/interface to bind to for when
         connecting to the remote peer.  INADDR_ANY ('0.0.0.0') or
         INADDR6_ANY ('0:0:0:0:0:0:0:0' a.k.a. '::') MAY be used to
         explicitly indicate the implicit default, which the server
         can bind to any IPv4 or IPv6 address.";
    }
    leaf local-port {
      if-feature "local-binding-supported";
      type inet:port-number;
      default "0";
      description
        "The local IP port number to bind to for when connecting
         to the remote peer.  The port number '0', which is the
         default value, indicates that any available local port
         number may be used.";
    }
    container proxy-server {
      if-feature "proxy-connect";
      presence "Indicates that a proxy connection has been
                configured. Present so that the mandatory
                descendant nodes do not imply that this node
                must be configured.";
      choice proxy-type {
        mandatory true;
        description
          "Selects a proxy connection protocol.";
        case socks4 {
          if-feature "socks4-supported";
          container socks4-parameters {
            leaf remote-address {
              type inet:ip-address;
              mandatory true;
              description
                "The IP address of the proxy server.";
            }
            leaf remote-port {
              type inet:port-number;
              default "1080";
              description
                "The IP port number for the proxy server.";
            }
            description
              "Parameters for connecting to a TCP-based proxy
               server using the SOCKS4 protocol.";
            reference
              "SOCKS Proceedings: 1992 Usenix Security Symposium";
          }
        }
        case socks4a {
          if-feature "socks4a-supported";
          container socks4a-parameters {
            leaf remote-address {
              type inet:host;
              mandatory true;
              description
                "The IP address or hostname of the proxy server.";
            }
            leaf remote-port {
              type inet:port-number;
              default "1080";
              description
                "The IP port number for the proxy server.";
            }
            description
              "Parameters for connecting to a TCP-based proxy
               server using the SOCKS4a protocol.";
            reference
              "SOCKS Proceedings:
                 1992 Usenix Security Symposium
               OpenSSH message:
                 SOCKS 4A: A Simple Extension to SOCKS 4 Protocol
                 &lt;https://www.openssh.com/txt/socks4a.protocol&gt;";
          }
        }
        case socks5 {
          if-feature "socks5-supported";
          container socks5-parameters {
            leaf remote-address {
              type inet:host;
              mandatory true;
              description
                "The IP address or hostname of the proxy server.";
            }
            leaf remote-port {
              type inet:port-number;
              default "1080";
              description
                "The IP port number for the proxy server.";
            }
            container authentication-parameters {
              presence "Indicates that an authentication mechanism
                        has been configured.  Present so that the
                        mandatory descendant nodes do not imply that
                        this node must be configured.";
              description
                "A container for SOCKS Version 5 authentication
                 mechanisms.

                 A complete list of methods is defined at:
                 &lt;https://www.iana.org/assignments/socks-methods&gt;.";
              reference
                "RFC 1928: SOCKS Protocol Version 5";
              choice auth-type {
                mandatory true;
                description
                  "A choice amongst supported SOCKS Version 5
                   authentication mechanisms.";
                case gss-api {
                  if-feature "socks5-gss-api";
                  container gss-api {
                    description
                      "Contains GSS-API configuration.  Defines
                       as an empty container to enable specific
                       GSS-API configuration to be augmented in
                       by future modules.";
                    reference
                      "RFC 1928: SOCKS Protocol Version 5
                       RFC 2743: Generic Security Service
                                 Application Program Interface
                                 Version 2, Update 1";
                  }
                }
                case username-password {
                  if-feature "socks5-username-password";
                  container username-password {
                    leaf username {
                      type string;
                      mandatory true;
                      description
                        "The 'username' value to use for client
                         identification.";
                    }
                    uses ct:password-grouping {
                      description
                        "The password to be used for client
                         authentication.";
                    }
                    description
                      "Contains username/password configuration.";
                    reference
                      "RFC 1929: Username/Password Authentication
                                 for SOCKS V5";
                  }
                }
              }
            }
            description
              "Parameters for connecting to a TCP-based proxy server
               using the SOCKS5 protocol.";
            reference
              "RFC 1928: SOCKS Protocol Version 5";
          }
        }
      }
      description
        "Proxy server settings.";
    }

    uses tcpcmn:tcp-common-grouping {
      refine "keepalives" {
        if-feature "tcp-client-keepalives";
        description
          "An 'if-feature' statement so that implementations
           can choose to support TCP client keepalives.";
      }
    }
  }
}
</sourcecode>
      </section>
    </section>
    <section anchor="tcp-server-model" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-the-ietf-tcp-server-module">The "ietf-tcp-server" Module</name>
      <t indent="0" pn="section-4-1">This section defines a YANG 1.1 module called
        "ietf-tcp-server".  A high-level overview of the module is provided in
        <xref target="server-overview" format="default" sectionFormat="of" derivedContent="Section 4.1"/>. Examples illustrating the module's use
        are provided in <xref target="server-examples" format="default" sectionFormat="of" derivedContent="Section 4.2"/> ("Example Usage"). The YANG
        module itself is defined in <xref target="server-yang-module" format="default" sectionFormat="of" derivedContent="Section 4.3"/>.</t>
      <section anchor="server-overview" numbered="true" removeInRFC="false" toc="include" pn="section-4.1">
        <name slugifiedName="name-data-model-overview-3">Data Model Overview</name>
        <t indent="0" pn="section-4.1-1">This section provides an overview of the "ietf-tcp-server" module
          in terms of its features and groupings.</t>
        <section toc="exclude" numbered="true" removeInRFC="false" pn="section-4.1.1">
          <name slugifiedName="name-features-3">Features</name>
          <t indent="0" pn="section-4.1.1-1">The following diagram lists all the "feature" statements
            defined in the "ietf-tcp-server" module:</t>
          <sourcecode type="yangtree" markers="false" pn="section-4.1.1-2">
Features:
  +-- tcp-server-keepalives
</sourcecode>
          <t indent="0" pn="section-4.1.1-3">The diagram above uses syntax that is similar to but not
              defined in <xref target="RFC8340" format="default" sectionFormat="of" derivedContent="RFC8340"/>.</t>
        </section>
        <section toc="exclude" numbered="true" removeInRFC="false" pn="section-4.1.2">
          <name slugifiedName="name-groupings-3">Groupings</name>
          <t indent="0" pn="section-4.1.2-1">The "ietf-tcp-server" module defines the following "grouping" statement:</t>
          <ul spacing="compact" bare="false" empty="false" indent="3" pn="section-4.1.2-2">
            <li pn="section-4.1.2-2.1">tcp-server-grouping</li>
          </ul>
          <t indent="0" pn="section-4.1.2-3">This grouping is presented in the following subsection.</t>
          <section anchor="tcp-server-grouping" numbered="true" removeInRFC="false" toc="exclude" pn="section-4.1.2.1">
            <name slugifiedName="name-the-tcp-server-grouping-gro">The "tcp-server-grouping" Grouping</name>
            <t indent="0" pn="section-4.1.2.1-1">The following tree diagram <xref target="RFC8340" format="default" sectionFormat="of" derivedContent="RFC8340"/> illustrates the
              "tcp-server-grouping" grouping:</t>
            <sourcecode type="yangtree" markers="false" pn="section-4.1.2.1-2">
  grouping tcp-server-grouping:
    +-- local-bind* [local-address]
    |  +-- local-address   inet:ip-address
    |  +-- local-port?     inet:port-number
    +---u tcpcmn:tcp-common-grouping
</sourcecode>
            <t indent="0" pn="section-4.1.2.1-3">Comments:</t>
            <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-4.1.2.1-4">
              <li pn="section-4.1.2.1-4.1">The "local-address" node, which is mandatory, may be configured as
                an IPv4 address, an IPv6 address, or a wildcard value.</li>
              <li pn="section-4.1.2.1-4.2">The "local-port" leaf is defined with neither a "default" nor a "mandatory"
statement.  YANG modules using this grouping <bcp14>SHOULD</bcp14> refine the 
grouping with a "default" statement, when the port number is well-known (e.g., a port number allocated by IANA), or with a "mandatory" statement,	if a port number needs to always be configured.   The <bcp14>SHOULD</bcp14> can be ignored when the port number is neither well-known nor mandatory to configure, such as might be the case when this grouping is used by another grouping.</li>
              <li pn="section-4.1.2.1-4.3">This grouping uses the "tcp-common-grouping" grouping discussed in
                <xref target="tcp-common-grouping" format="default" sectionFormat="of" derivedContent="Section 2.1.3.1"/>.</li>
            </ul>
          </section>
        </section>
        <section toc="exclude" numbered="true" removeInRFC="false" pn="section-4.1.3">
          <name slugifiedName="name-protocol-accessible-nodes-3">Protocol-Accessible Nodes</name>
          <t indent="0" pn="section-4.1.3-1">The "ietf-tcp-server" module defines only "grouping" statements that are used by
            other modules to instantiate protocol-accessible nodes.  Thus, this module, when
            implemented, does not itself define any protocol-accessible nodes.</t>
        </section>
      </section>
      <section anchor="server-examples" numbered="true" removeInRFC="false" toc="include" pn="section-4.2">
        <name slugifiedName="name-example-usage-3">Example Usage</name>
        <t indent="0" pn="section-4.2-1">This section presents an example showing the "tcp-server-grouping" grouping
        populated with some data.</t>
        <sourcecode type="xml" markers="false" pn="section-4.2-2">
&lt;!-- The outermost element below doesn't exist in the data model. --&gt;
&lt;!--  It simulates if the "grouping" were a "container" instead.  --&gt;

&lt;tcp-server xmlns="urn:ietf:params:xml:ns:yang:ietf-tcp-server"&gt;
  &lt;local-bind&gt;
    &lt;local-address&gt;192.0.2.2&lt;/local-address&gt;
    &lt;local-port&gt;49152&lt;/local-port&gt;
  &lt;/local-bind&gt;
  &lt;keepalives&gt;
    &lt;idle-time&gt;7200&lt;/idle-time&gt;
    &lt;max-probes&gt;9&lt;/max-probes&gt;
    &lt;probe-interval&gt;75&lt;/probe-interval&gt;
  &lt;/keepalives&gt;
&lt;/tcp-server&gt;
</sourcecode>
      </section>
      <section anchor="server-yang-module" numbered="true" removeInRFC="false" toc="include" pn="section-4.3">
        <name slugifiedName="name-yang-module-3">YANG Module</name>
        <t indent="0" pn="section-4.3-1">The "ietf-tcp-server" YANG module references <xref target="RFC6991" format="default" sectionFormat="of" derivedContent="RFC6991"/>
           and <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>.</t>
        <sourcecode name="ietf-tcp-server@2024-10-10.yang" type="yang" markers="true" pn="section-4.3-2">
module ietf-tcp-server {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-server";
  prefix tcps;

  import ietf-inet-types {
    prefix inet;
    reference
      "RFC 6991: Common YANG Data Types";
  }

  import ietf-tcp-common {
    prefix tcpcmn;
    reference
      "RFC 9643: YANG Groupings for TCP Clients and TCP Servers";
  }

  organization
    "IETF NETCONF (Network Configuration) Working Group and the
     IETF TCP Maintenance and Minor Extensions (TCPM) Working Group";

  contact
    "WG Web:   https://datatracker.ietf.org/wg/netconf
               https://datatracker.ietf.org/wg/tcpm
     WG List:  NETCONF WG list &lt;mailto:netconf@ietf.org&gt;
               TCPM WG list &lt;mailto:tcpm@ietf.org&gt;
     Authors:  Kent Watsen &lt;mailto:kent+ietf@watsen.net&gt;
               Michael Scharf
               &lt;mailto:michael.scharf@hs-esslingen.de&gt;";

  description
    "This module defines reusable groupings for TCP servers that
     can be used as a basis for specific TCP server instances.

     Copyright (c) 2024 IETF Trust and the persons identified
     as authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with
     or without modification, is permitted pursuant to, and
     subject to the license terms contained in, the Revised
     BSD License set forth in Section 4.c of the IETF Trust's
     Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC 9643
     (https://www.rfc-editor.org/info/rfc9643); see the RFC
     itself for full legal notices.";

  revision 2024-10-10 {
    description
      "Initial version.";
    reference
      "RFC 9643: YANG Groupings for TCP Clients and TCP Servers";
  }

  // Features

  feature tcp-server-keepalives {
    description
      "TCP keepalive parameters are configurable for
       TCP servers on the server implementing this feature.";
    reference
      "RFC 9293: Transmission Control Protocol (TCP)";
  }

  // Groupings

  grouping tcp-server-grouping {
    description
      "A reusable grouping for configuring a TCP server.

       Note that this grouping uses fairly typical descendant
       node names such that a stack of 'uses' statements will
       have name conflicts.  It is intended that the consuming
       data model will resolve the issue (e.g., by wrapping
       the 'uses' statement in a container called
       'tcp-server-parameters').  This model purposely does
       not do this itself so as to provide maximum flexibility
       to consuming models.";
    list local-bind {
      key "local-address";
      min-elements 1;
      description
        "A list of bind (listen) points for this server
         instance.  A server instance may have multiple
         bind points to support, e.g., the same port in
         different address families or different ports
         in the same address family.";
      leaf local-address {
        type inet:ip-address;
        description
          "The local IP address to listen on for incoming
           TCP client connections.  To configure listening
           on all IPv4 addresses, the value must be '0.0.0.0'
           (INADDR_ANY).  To configure listening on all IPv6
           addresses, the value must be '::' (INADDR6_ANY).";
      }
      leaf local-port {
        type inet:port-number;
        description
          "The local port number to listen on for incoming TCP
           client connections.";
      }
    }
    uses tcpcmn:tcp-common-grouping {
      refine "keepalives" {
        if-feature "tcp-server-keepalives";
        description
          "An 'if-feature' statement so that implementations
           can choose to support TCP server keepalives.";
      }
    }
  }
}
</sourcecode>
      </section>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-5-1">The three YANG modules in this document define groupings and will
        not be deployed as standalone modules. Their security implications
        may be context-dependent based on their use in other modules.  The
        designers of modules that import these groupings must conduct their
        own analysis of the security considerations.</t>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-5.1">
        <name slugifiedName="name-considerations-for-the-ietf">Considerations for the "ietf-tcp-common" YANG Module</name>
        <t indent="0" pn="section-5.1-1">This section is modeled after the template defined in <xref section="3.7.1" sectionFormat="of" target="RFC8407" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8407#section-3.7.1" derivedContent="RFC8407"/>.</t>
        <t indent="0" pn="section-5.1-2">The "ietf-tcp-common" YANG module defines "grouping" statements
          that are designed to be accessed via YANG-based management
          protocols, such as NETCONF <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241"/> and RESTCONF
          <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040"/>.  Both of these protocols have
          mandatory-to-implement secure transport layers (e.g.,
   Secure Shell (SSH) <xref target="RFC4252" format="default" sectionFormat="of" derivedContent="RFC4252"/>, TLS <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/>, and QUIC <xref target="RFC9000" format="default" sectionFormat="of" derivedContent="RFC9000"/>) and
   mandatory-to-implement mutual authentication.</t>
        <t indent="0" pn="section-5.1-3">The Network Configuration Access Control Model (NACM) <xref target="RFC8341" format="default" sectionFormat="of" derivedContent="RFC8341"/>
          provides the means to restrict access for particular users to a
          preconfigured subset of all available protocol operations and
          content.</t>
        <t indent="0" pn="section-5.1-4">Please be aware that this YANG module uses groupings from
          other YANG modules that define nodes that may be considered
          sensitive or vulnerable in network environments.  Please
          review the security considerations for dependent YANG modules
          for information as to which nodes may be considered sensitive
          or vulnerable in network environments.</t>
        <t indent="0" pn="section-5.1-5">None of the readable data nodes defined in this YANG module are
          considered sensitive or vulnerable in network environments.
          The NACM "default-deny-all" extension has not been set for
          any data nodes defined in this module.</t>
        <t indent="0" pn="section-5.1-6">None of the writable data nodes defined in this YANG module are
          considered sensitive or vulnerable in network environments.
          The NACM "default-deny-write" extension has not been set for
          any data nodes defined in this module.</t>
        <t indent="0" pn="section-5.1-7">This module does not define any RPCs, actions, or notifications,
          and thus, the security considerations for such are not provided here.</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-5.2">
        <name slugifiedName="name-considerations-for-the-ietf-">Considerations for the "ietf-tcp-client" YANG Module</name>
        <t indent="0" pn="section-5.2-1">This section is modeled after the template defined in <xref section="3.7.1" sectionFormat="of" target="RFC8407" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8407#section-3.7.1" derivedContent="RFC8407"/>.</t>
        <t indent="0" pn="section-5.2-2">The "ietf-tcp-client" YANG module defines "grouping" statements
          that are designed to be accessed via YANG-based management
          protocols, such as NETCONF <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241"/> and RESTCONF
          <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040"/>.  Both of these protocols have
          mandatory-to-implement secure transport layers (e.g.,
   Secure Shell (SSH) <xref target="RFC4252" format="default" sectionFormat="of" derivedContent="RFC4252"/>, TLS <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/>, and QUIC <xref target="RFC9000" format="default" sectionFormat="of" derivedContent="RFC9000"/>) and
   mandatory-to-implement mutual authentication.</t>
        <t indent="0" pn="section-5.2-3">The Network Configuration Access Control Model (NACM) <xref target="RFC8341" format="default" sectionFormat="of" derivedContent="RFC8341"/>
          provides the means to restrict access for particular users to a
          preconfigured subset of all available protocol operations and
          content.</t>
        <t indent="0" pn="section-5.2-4">Please be aware that this YANG module uses groupings from
          other YANG modules that define nodes that may be considered
          sensitive or vulnerable in network environments.  Please
          review the security considerations for dependent YANG modules
          for information as to which nodes may be considered sensitive
          or vulnerable in network environments.</t>
        <t indent="0" pn="section-5.2-5">One readable data node defined in this YANG module may be considered
          sensitive or vulnerable in some network environments. This
          node is as follows:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-5.2-6">
          <li pn="section-5.2-6.1">
            <t indent="0" pn="section-5.2-6.1.1">The "proxy-server/socks5-parameters/authentication-parameters/username-password/password" node:
            </t>
            <ul empty="true" bare="false" indent="3" spacing="normal" pn="section-5.2-6.1.2">
              <li pn="section-5.2-6.1.2.1">The "password" node defined in the "tcp-client-grouping"
                  grouping is defined using the "password-grouping" grouping
                  presented in <xref target="RFC9640" format="default" sectionFormat="of" derivedContent="RFC9640"/>.
                  This grouping enables both cleartext and encrypted passwords
                  to be configured.  As the referenced document states, configuration
                  of cleartext passwords is <bcp14>NOT RECOMMENDED</bcp14>.  However, in the
                  case cleartext values are configured, this node is additionally
                  sensitive to read operations such that, in normal use cases,
                  it should never be returned to a client.  For this reason, the
                  NACM "default-deny-all" extension has been applied to it.</li>
            </ul>
          </li>
        </ul>
        <t indent="0" pn="section-5.2-7">None of the writable data nodes defined in this YANG module are
          considered sensitive or vulnerable in network environments.
          The NACM "default-deny-write" extension has not been set for
          any data nodes defined in this module.</t>
        <t indent="0" pn="section-5.2-8">This module does not define any RPCs, actions, or notifications,
          and thus, the security considerations for such are not provided here.</t>
        <t indent="0" pn="section-5.2-9">Implementations are <bcp14>RECOMMENDED</bcp14> to implement the "local-binding-supported"
          feature for cryptographically secure protocols so as to enable more
          granular ingress/egress firewall rule bases.  It is <bcp14>NOT RECOMMENDED</bcp14> to
          implement this feature for unsecure protocols, as per <xref target="RFC6056" format="default" sectionFormat="of" derivedContent="RFC6056"/>.</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-5.3">
        <name slugifiedName="name-considerations-for-the-ietf-t">Considerations for the "ietf-tcp-server" YANG Module</name>
        <t indent="0" pn="section-5.3-1">This section is modeled after the template defined in <xref section="3.7.1" sectionFormat="of" target="RFC8407" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8407#section-3.7.1" derivedContent="RFC8407"/>.</t>
        <t indent="0" pn="section-5.3-2">The "ietf-tcp-server" YANG module defines "grouping" statements
          that are designed to be accessed via YANG-based management
          protocols, such as NETCONF <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241"/> and RESTCONF
          <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040"/>.  Both of these protocols have
          mandatory-to-implement secure transport layers (e.g.,
   Secure Shell (SSH) <xref target="RFC4252" format="default" sectionFormat="of" derivedContent="RFC4252"/>, TLS <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/>, and QUIC <xref target="RFC9000" format="default" sectionFormat="of" derivedContent="RFC9000"/>) and
   mandatory-to-implement mutual authentication.</t>
        <t indent="0" pn="section-5.3-3">The Network Configuration Access Control Model (NACM) <xref target="RFC8341" format="default" sectionFormat="of" derivedContent="RFC8341"/>
          provides the means to restrict access for particular users to a
          preconfigured subset of all available protocol operations and
          content.</t>
        <t indent="0" pn="section-5.3-4">Please be aware that this YANG module uses groupings from
          other YANG modules that define nodes that may be considered
          sensitive or vulnerable in network environments.  Please
          review the security considerations for dependent YANG modules
          for information as to which nodes may be considered sensitive
          or vulnerable in network environments.</t>
        <t indent="0" pn="section-5.3-5">None of the readable data nodes defined in this YANG module are
          considered sensitive or vulnerable in network environments.
          The NACM "default-deny-all" extension has not been set for
          any data nodes defined in this module.</t>
        <t indent="0" pn="section-5.3-6">None of the writable data nodes defined in this YANG module are
          considered sensitive or vulnerable in network environments.
          The NACM "default-deny-write" extension has not been set for
          any data nodes defined in this module.</t>
        <t indent="0" pn="section-5.3-7">This module does not define any RPCs, actions, or notifications,
          and thus, the security considerations for such are not provided here.</t>
      </section>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-6.1">
        <name slugifiedName="name-the-ietf-xml-registry">The IETF XML Registry</name>
        <t indent="0" pn="section-6.1-1">IANA has registered the following URI in the "ns" registry of
  the "IETF XML Registry" <xref target="RFC3688" format="default" sectionFormat="of" derivedContent="RFC3688"/>.</t>
        <dl newline="false" spacing="compact" indent="3" pn="section-6.1-2">
          <dt pn="section-6.1-2.1">URI:</dt>
          <dd pn="section-6.1-2.2">urn:ietf:params:xml:ns:yang:ietf-tcp-common</dd>
          <dt pn="section-6.1-2.3">Registrant Contact:</dt>
          <dd pn="section-6.1-2.4">The IESG</dd>
          <dt pn="section-6.1-2.5">XML:</dt>
          <dd pn="section-6.1-2.6">N/A; the requested URI is an XML namespace.</dd>
        </dl>
        <dl newline="false" spacing="compact" indent="3" pn="section-6.1-3">
          <dt pn="section-6.1-3.1">URI:</dt>
          <dd pn="section-6.1-3.2">urn:ietf:params:xml:ns:yang:ietf-tcp-client</dd>
          <dt pn="section-6.1-3.3">Registrant Contact:</dt>
          <dd pn="section-6.1-3.4">The IESG</dd>
          <dt pn="section-6.1-3.5">XML:</dt>
          <dd pn="section-6.1-3.6">N/A; the requested URI is an XML namespace.</dd>
        </dl>
        <dl newline="false" spacing="compact" indent="3" pn="section-6.1-4">
          <dt pn="section-6.1-4.1">URI:</dt>
          <dd pn="section-6.1-4.2">urn:ietf:params:xml:ns:yang:ietf-tcp-server</dd>
          <dt pn="section-6.1-4.3">Registrant Contact:</dt>
          <dd pn="section-6.1-4.4">The IESG</dd>
          <dt pn="section-6.1-4.5">XML:</dt>
          <dd pn="section-6.1-4.6">N/A; the requested URI is an XML namespace.</dd>
        </dl>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-6.2">
        <name slugifiedName="name-the-yang-module-names-regis">The YANG Module Names Registry</name>
        <t indent="0" pn="section-6.2-1">IANA has registered the following three YANG modules in the "YANG Module Names"
        registry <xref target="RFC6020" format="default" sectionFormat="of" derivedContent="RFC6020"/>. </t>
        <dl newline="false" spacing="compact" indent="3" pn="section-6.2-2">
          <dt pn="section-6.2-2.1">Name:</dt>
          <dd pn="section-6.2-2.2">ietf-tcp-common</dd>
          <dt pn="section-6.2-2.3">Namespace:</dt>
          <dd pn="section-6.2-2.4">urn:ietf:params:xml:ns:yang:ietf-tcp-common</dd>
          <dt pn="section-6.2-2.5">Prefix:</dt>
          <dd pn="section-6.2-2.6">tcpcmn</dd>
          <dt pn="section-6.2-2.7">Reference:</dt>
          <dd pn="section-6.2-2.8">RFC 9643</dd>
        </dl>
        <dl newline="false" spacing="compact" indent="3" pn="section-6.2-3">
          <dt pn="section-6.2-3.1">Name:</dt>
          <dd pn="section-6.2-3.2">ietf-tcp-client</dd>
          <dt pn="section-6.2-3.3">Namespace:</dt>
          <dd pn="section-6.2-3.4">urn:ietf:params:xml:ns:yang:ietf-tcp-client</dd>
          <dt pn="section-6.2-3.5">Prefix:</dt>
          <dd pn="section-6.2-3.6">tcpc</dd>
          <dt pn="section-6.2-3.7">Reference:</dt>
          <dd pn="section-6.2-3.8">RFC 9643</dd>
        </dl>
        <dl newline="false" spacing="compact" indent="3" pn="section-6.2-4">
          <dt pn="section-6.2-4.1">Name:</dt>
          <dd pn="section-6.2-4.2">ietf-tcp-server</dd>
          <dt pn="section-6.2-4.3">Namespace:</dt>
          <dd pn="section-6.2-4.4">urn:ietf:params:xml:ns:yang:ietf-tcp-server</dd>
          <dt pn="section-6.2-4.5">Prefix:</dt>
          <dd pn="section-6.2-4.6">tcps</dd>
          <dt pn="section-6.2-4.7">Reference:</dt>
          <dd pn="section-6.2-4.8">RFC 9643</dd>
        </dl>
      </section>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-netconf-http-client-server" to="HTTP-CLIENT-SERVER"/>
    <displayreference target="I-D.ietf-netconf-netconf-client-server" to="NETCONF-CLIENT-SERVER"/>
    <displayreference target="I-D.ietf-netconf-restconf-client-server" to="RESTCONF-CLIENT-SERVER"/>
    <references pn="section-7">
      <name slugifiedName="name-references">References</name>
      <references pn="section-7.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4252" target="https://www.rfc-editor.org/info/rfc4252" quoteTitle="true" derivedAnchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t indent="0">The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC6020" target="https://www.rfc-editor.org/info/rfc6020" quoteTitle="true" derivedAnchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t indent="0">YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6991" target="https://www.rfc-editor.org/info/rfc6991" quoteTitle="true" derivedAnchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t indent="0">This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" quoteTitle="true" derivedAnchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t indent="0">YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8341" target="https://www.rfc-editor.org/info/rfc8341" quoteTitle="true" derivedAnchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t indent="0">The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t indent="0">This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" quoteTitle="true" derivedAnchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t indent="0">This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9293" target="https://www.rfc-editor.org/info/rfc9293" quoteTitle="true" derivedAnchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
            <date month="August" year="2022"/>
            <abstract>
              <t indent="0">This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="9293"/>
          <seriesInfo name="DOI" value="10.17487/RFC9293"/>
        </reference>
        <reference anchor="RFC9640" target="https://www.rfc-editor.org/info/rfc9640" quoteTitle="true" derivedAnchor="RFC9640">
          <front>
            <title>YANG Data Types and Groupings for Cryptography</title>
            <author initials="K." surname="Watsen" fullname="Kent Watsen">
              <organization showOnFrontPage="true">Watsen Networks</organization>
            </author>
            <date month="October" year="2024"/>
          </front>
          <seriesInfo name="RFC" value="9640"/>
          <seriesInfo name="DOI" value="10.17487/RFC9640"/>
        </reference>
      </references>
      <references pn="section-7.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.ietf-netconf-http-client-server" target="https://datatracker.ietf.org/doc/html/draft-ietf-netconf-http-client-server-23" quoteTitle="true" derivedAnchor="HTTP-CLIENT-SERVER">
          <front>
            <title>YANG Groupings for HTTP Clients and HTTP Servers</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization showOnFrontPage="true">Watsen Networks</organization>
            </author>
            <date day="15" month="August" year="2024"/>
            <abstract>
              <t indent="0">This document presents two YANG modules: the first defines a minimal grouping for configuring an HTTP client, and the second defines a minimal grouping for configuring an HTTP server. It is intended that these groupings will be used to help define the configuration for simple HTTP-based protocols (not for complete web servers or browsers). Support is provided for HTTP/1.1, HTTP/2, and HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-http-client-server-23"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-netconf-netconf-client-server" target="https://datatracker.ietf.org/doc/html/draft-ietf-netconf-netconf-client-server-37" quoteTitle="true" derivedAnchor="NETCONF-CLIENT-SERVER">
          <front>
            <title>NETCONF Client and Server Models</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization showOnFrontPage="true">Watsen Networks</organization>
            </author>
            <date day="14" month="August" year="2024"/>
            <abstract>
              <t indent="0">This document presents two YANG modules, one module to configure a NETCONF client and the other module to configure a NETCONF server. Both modules support both the SSH and TLS transport protocols, and support both standard NETCONF and NETCONF Call Home connections. Editorial Note (To be removed by RFC Editor) This draft contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed. No other RFC Editor instructions are specified elsewhere in this document. Artwork in this document contains shorthand references to drafts in progress. Please apply the following replacements (note: not all may be present): * AAAA --&gt; the assigned RFC value for draft-ietf-netconf-crypto- types * BBBB --&gt; the assigned RFC value for draft-ietf-netconf-trust- anchors * CCCC --&gt; the assigned RFC value for draft-ietf-netconf-keystore * DDDD --&gt; the assigned RFC value for draft-ietf-netconf-tcp-client- server * EEEE --&gt; the assigned RFC value for draft-ietf-netconf-ssh-client- server * FFFF --&gt; the assigned RFC value for draft-ietf-netconf-tls-client- server * GGGG --&gt; the assigned RFC value for draft-ietf-netconf-http- client-server * HHHH --&gt; the assigned RFC value for this draft Artwork in this document contains placeholder values for the date of publication of this draft. Please apply the following replacement: * 2024-08-14 --&gt; the publication date of this draft The "Relation to other RFCs" section Section 1.1 contains the text "one or more YANG modules" and, later, "modules". This text is sourced from a file in a context where it is unknown how many modules a draft defines. The text is not wrong as is, but it may be improved by stating more directly how many modules are defined. The "Relation to other RFCs" section Section 1.1 contains a self- reference to this draft, along with a corresponding reference in the Appendix. Please replace the self-reference in this section with "This RFC" (or similar) and remove the self-reference in the "Normative/Informative References" section, whichever it is in. Tree-diagrams in this draft may use the '\' line-folding mode defined in RFC 8792. However, nicer-to-the-eye is when the '\\' line-folding mode is used. The AD suggested suggested putting a request here for the RFC Editor to help convert "ugly" '\' folded examples to use the '\\' folding mode. "Help convert" may be interpreted as, identify what looks ugly and ask the authors to make the adjustment. The following Appendix section is to be removed prior to publication: * Appendix A. Change Log</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-netconf-client-server-37"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-netconf-restconf-client-server" target="https://datatracker.ietf.org/doc/html/draft-ietf-netconf-restconf-client-server-38" quoteTitle="true" derivedAnchor="RESTCONF-CLIENT-SERVER">
          <front>
            <title>RESTCONF Client and Server Models</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization showOnFrontPage="true">Watsen Networks</organization>
            </author>
            <date day="14" month="August" year="2024"/>
            <abstract>
              <t indent="0">This document presents two YANG modules, one module to configure a RESTCONF client and the other module to configure a RESTCONF server. Both modules support the TLS transport protocol with both standard RESTCONF and RESTCONF Call Home connections. Editorial Note (To be removed by RFC Editor) This draft contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed. No other RFC Editor instructions are specified elsewhere in this document. Artwork in this document contains shorthand references to drafts in progress. Please apply the following replacements (note: not all may be present): * AAAA --&gt; the assigned RFC value for draft-ietf-netconf-crypto- types * BBBB --&gt; the assigned RFC value for draft-ietf-netconf-trust- anchors * CCCC --&gt; the assigned RFC value for draft-ietf-netconf-keystore * DDDD --&gt; the assigned RFC value for draft-ietf-netconf-tcp-client- server * EEEE --&gt; the assigned RFC value for draft-ietf-netconf-ssh-client- server * FFFF --&gt; the assigned RFC value for draft-ietf-netconf-tls-client- server * GGGG --&gt; the assigned RFC value for draft-ietf-netconf-http- client-server * HHHH --&gt; the assigned RFC value for draft-ietf-netconf-netconf- client-server * IIII --&gt; the assigned RFC value for this draft Artwork in this document contains placeholder values for the date of publication of this draft. Please apply the following replacement: * 2024-08-14 --&gt; the publication date of this draft The "Relation to other RFCs" section Section 1.1 contains the text "one or more YANG modules" and, later, "modules". This text is sourced from a file in a context where it is unknown how many modules a draft defines. The text is not wrong as is, but it may be improved by stating more directly how many modules are defined. The "Relation to other RFCs" section Section 1.1 contains a self- reference to this draft, along with a corresponding reference in the Appendix. Please replace the self-reference in this section with "This RFC" (or similar) and remove the self-reference in the "Normative/Informative References" section, whichever it is in. Tree-diagrams in this draft may use the '\' line-folding mode defined in RFC 8792. However, nicer-to-the-eye is when the '\\' line-folding mode is used. The AD suggested suggested putting a request here for the RFC Editor to help convert "ugly" '\' folded examples to use the '\\' folding mode. "Help convert" may be interpreted as, identify what looks ugly and ask the authors to make the adjustment. The following Appendix section is to be removed prior to publication: * Appendix A. Change Log</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-restconf-client-server-38"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC1928" target="https://www.rfc-editor.org/info/rfc1928" quoteTitle="true" derivedAnchor="RFC1928">
          <front>
            <title>SOCKS Protocol Version 5</title>
            <author fullname="M. Leech" initials="M." surname="Leech"/>
            <author fullname="M. Ganis" initials="M." surname="Ganis"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="R. Kuris" initials="R." surname="Kuris"/>
            <author fullname="D. Koblas" initials="D." surname="Koblas"/>
            <author fullname="L. Jones" initials="L." surname="Jones"/>
            <date month="March" year="1996"/>
            <abstract>
              <t indent="0">This memo describes a protocol that is an evolution of the previous version of the protocol, version 4 [1]. This new protocol stems from active discussions and prototype implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1928"/>
          <seriesInfo name="DOI" value="10.17487/RFC1928"/>
        </reference>
        <reference anchor="RFC1929" target="https://www.rfc-editor.org/info/rfc1929" quoteTitle="true" derivedAnchor="RFC1929">
          <front>
            <title>Username/Password Authentication for SOCKS V5</title>
            <author fullname="M. Leech" initials="M." surname="Leech"/>
            <date month="March" year="1996"/>
            <abstract>
              <t indent="0">The protocol specification for SOCKS Version 5 specifies a generalized framework for the use of arbitrary authentication protocols in the initial socks connection setup. This document describes one of those protocols, as it fits into the SOCKS Version 5 authentication "subnegotiation". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1929"/>
          <seriesInfo name="DOI" value="10.17487/RFC1929"/>
        </reference>
        <reference anchor="RFC2743" target="https://www.rfc-editor.org/info/rfc2743" quoteTitle="true" derivedAnchor="RFC2743">
          <front>
            <title>Generic Security Service Application Program Interface Version 2, Update 1</title>
            <author fullname="J. Linn" initials="J." surname="Linn"/>
            <date month="January" year="2000"/>
            <abstract>
              <t indent="0">This memo obsoletes [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2743"/>
          <seriesInfo name="DOI" value="10.17487/RFC2743"/>
        </reference>
        <reference anchor="RFC3688" target="https://www.rfc-editor.org/info/rfc3688" quoteTitle="true" derivedAnchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t indent="0">This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6056" target="https://www.rfc-editor.org/info/rfc6056" quoteTitle="true" derivedAnchor="RFC6056">
          <front>
            <title>Recommendations for Transport-Protocol Port Randomization</title>
            <author fullname="M. Larsen" initials="M." surname="Larsen"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="January" year="2011"/>
            <abstract>
              <t indent="0">During the last few years, awareness has been raised about a number of "blind" attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols. The consequences of these attacks range from throughput reduction to broken connections or data corruption. These attacks rely on the attacker's ability to guess or know the five-tuple (Protocol, Source Address, Destination Address, Source Port, Destination Port) that identifies the transport protocol instance to be attacked. This document describes a number of simple and efficient methods for the selection of the client port number, such that the possibility of an attacker guessing the exact value is reduced. While this is not a replacement for cryptographic methods for protecting the transport-protocol instance, the aforementioned port selection algorithms provide improved security with very little effort and without any key management overhead. The algorithms described in this document are local policies that may be incrementally deployed and that do not violate the specifications of any of the transport protocols that may benefit from them, such as TCP, UDP, UDP-lite, Stream Control Transmission Protocol (SCTP), Datagram Congestion Control Protocol (DCCP), and RTP (provided that the RTP application explicitly signals the RTP and RTCP port numbers). This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="156"/>
          <seriesInfo name="RFC" value="6056"/>
          <seriesInfo name="DOI" value="10.17487/RFC6056"/>
        </reference>
        <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241" quoteTitle="true" derivedAnchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t indent="0">The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040" target="https://www.rfc-editor.org/info/rfc8040" quoteTitle="true" derivedAnchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t indent="0">This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" quoteTitle="true" derivedAnchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t indent="0">JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t indent="0">This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8340" target="https://www.rfc-editor.org/info/rfc8340" quoteTitle="true" derivedAnchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t indent="0">This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8342" target="https://www.rfc-editor.org/info/rfc8342" quoteTitle="true" derivedAnchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t indent="0">Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC8407" target="https://www.rfc-editor.org/info/rfc8407" quoteTitle="true" derivedAnchor="RFC8407">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="October" year="2018"/>
            <abstract>
              <t indent="0">This memo provides guidelines for authors and reviewers of specifications containing YANG modules. Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules. This document obsoletes RFC 6087.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="8407"/>
          <seriesInfo name="DOI" value="10.17487/RFC8407"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9641" target="https://www.rfc-editor.org/info/rfc9641" quoteTitle="true" derivedAnchor="RFC9641">
          <front>
            <title>A YANG Data Model for a Truststore</title>
            <author initials="K." surname="Watsen" fullname="Kent Watsen">
              <organization showOnFrontPage="true">Watsen Networks</organization>
            </author>
            <date month="October" year="2024"/>
          </front>
          <seriesInfo name="RFC" value="9641"/>
          <seriesInfo name="DOI" value="10.17487/RFC9641"/>
        </reference>
        <reference anchor="RFC9642" target="https://www.rfc-editor.org/info/rfc9642" quoteTitle="true" derivedAnchor="RFC9642">
          <front>
            <title>A YANG Data Model for a Keystore</title>
            <author initials="K." surname="Watsen" fullname="Kent Watsen">
              <organization showOnFrontPage="true">Watsen Networks</organization>
            </author>
            <date month="October" year="2024"/>
          </front>
          <seriesInfo name="RFC" value="9642"/>
          <seriesInfo name="DOI" value="10.17487/RFC9642"/>
        </reference>
        <reference anchor="RFC9644" target="https://www.rfc-editor.org/info/rfc9644" quoteTitle="true" derivedAnchor="RFC9644">
          <front>
            <title>YANG Groupings for SSH Clients and SSH Servers</title>
            <author initials="K." surname="Watsen" fullname="Kent Watsen">
              <organization showOnFrontPage="true">Watsen Networks</organization>
            </author>
            <date month="October" year="2024"/>
          </front>
          <seriesInfo name="RFC" value="9644"/>
          <seriesInfo name="DOI" value="10.17487/RFC9644"/>
        </reference>
        <reference anchor="RFC9645" target="https://www.rfc-editor.org/info/rfc9645" quoteTitle="true" derivedAnchor="RFC9645">
          <front>
            <title>YANG Groupings for TLS Clients and TLS Servers</title>
            <author initials="K." surname="Watsen" fullname="Kent Watsen">
              <organization showOnFrontPage="true">Watsen Networks</organization>
            </author>
            <date month="October" year="2024"/>
          </front>
          <seriesInfo name="RFC" value="9645"/>
          <seriesInfo name="DOI" value="10.17487/RFC9645"/>
        </reference>
        <reference anchor="SOCKS" target="https://www.usenix.org/legacy/publications/library/proceedings/sec92/full_papers/koblas.pdf" quoteTitle="true" derivedAnchor="SOCKS">
          <front>
            <title>SOCKS</title>
            <author fullname="David Koblas" surname="Koblas" initials="D."/>
            <author fullname="Michelle R. Koblas" surname="Koblas" initials="M."/>
            <date month="September" year="1992"/>
          </front>
          <refcontent>USENIX UNIX Security Symposium III</refcontent>
        </reference>
        <reference anchor="SOCKS_4A" target="https://www.openssh.com/txt/socks4a.protocol" quoteTitle="true" derivedAnchor="SOCKS_4A">
          <front>
            <title>SOCKS 4A: A Simple Extension to SOCKS 4 Protocol</title>
            <author fullname="Ying-Da Lee" surname="Lee" initials="Y."/>
          </front>
        </reference>
        <reference anchor="W3C.REC-xml-20081126" target="https://www.w3.org/TR/2008/REC-xml-20081126/" quoteTitle="true" derivedAnchor="W3C.REC-xml-20081126">
          <front>
            <title>Extensible Markup Language (XML) 1.0 (Fifth Edition)</title>
            <author initials="T." surname="Bray" fullname="Tim Bray"/>
            <author initials="J." surname="Paoli" fullname="Jean Paoli"/>
            <author initials="C.M." surname="Sperberg-McQueen" fullname="C. M. Sperberg-McQueen"/>
            <author initials="E." surname="Maler" fullname="Eve Maler"/>
            <author initials="F." surname="Yergeau" fullname="François Yergeau"/>
            <date month="November" year="2008"/>
          </front>
          <seriesInfo name="World Wide Web Consortium                     Recommendation" value="REC-xml-20081126"/>
        </reference>
      </references>
    </references>
    <section numbered="false" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1">The authors would like to thank the following for lively discussions
        on list and in the halls (ordered by first name):
        <contact fullname="Éric Vyncke"/>,
        <contact fullname="Joe Clarke"/>,
        <contact fullname="Jürgen Schönwälder"/>,
        <contact fullname="Ladislav Lhotka"/>,
        <contact fullname="Mallory Knodel"/>,
        <contact fullname="Martin Duke"/>,
        <contact fullname="Michael Tüxen"/>,
        <contact fullname="Mohamed Boucadair"/>,
        <contact fullname="Nancy Cam-Winget"/>,
        <contact fullname="Nick Hancock"/>,
        <contact fullname="Per Andersson"/>,
        <contact fullname="Rob Wilton"/>,
        <contact fullname="Roman Danyliw"/>,
        <contact fullname="Tom Petch"/>, and
        <contact fullname="Wim Henderickx"/>.
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Kent Watsen" initials="K." surname="Watsen">
        <organization showOnFrontPage="true">Watsen Networks</organization>
        <address>
          <email>kent+ietf@watsen.net</email>
        </address>
      </author>
      <author fullname="Michael Scharf" initials="M." surname="Scharf">
        <organization abbrev="Hochschule Esslingen" showOnFrontPage="true">Hochschule Esslingen</organization>
        <address>
          <postal>
            <street>University of Applied Sciences</street>
            <street>Kanalstr. 33</street>
            <code>73728</code>
            <city>Esslingen am Neckar</city>
            <country>Germany</country>
          </postal>
          <email>michael.scharf@hs-esslingen.de</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
